• No results found

[PDF] Top 20 Volume :11 Issue : 9 (September-2018) | International Research Journal of Business and Management

Has 10000 "Volume :11 Issue : 9 (September-2018) | International Research Journal of Business and Management" found on our website. Below are the top 20 most common "Volume :11 Issue : 9 (September-2018) | International Research Journal of Business and Management".

Volume :11 Issue : 9 (September-2018) | International Research Journal of Business and Management

Volume :11 Issue : 9 (September-2018) | International Research Journal of Business and Management

... Naresh Khatri et al. (2006) examined on strategic human resource management (HRM) issues in an University and a Community hospital. The findings indicate that the two hospitals lacked a clear understanding of ... See full document

5

Volume :11 Issue : 9 (September-2018) | International Research Journal of Business and Management

Volume :11 Issue : 9 (September-2018) | International Research Journal of Business and Management

... as business leaders because of the contemporary demographic, technological, environmental changes and changes in the individual expectations and aspirations, in India, the demographic changes are seen in the forms ... See full document

9

Volume :11 Issue : 8 (August-2018) | International Research Journal of Business and Management

Volume :11 Issue : 8 (August-2018) | International Research Journal of Business and Management

... on disclosure is considered as unimportant, less important, neutral, important and very important if calculated mean score is < 1.50, >= 1.50 and < 2.50, >= 2.50 and < 3.50, >= 3.50 and < 4.50, and ... See full document

12

Volume :11 Issue : 10 (October-2018) | International Research Journal of Business and Management

Volume :11 Issue : 10 (October-2018) | International Research Journal of Business and Management

... The Indian health care industry had undergone a paradigm shift due to people’s inclination to Ayurvedic/Herbal therapy in order to get rid of the various adverse post-treatment effects of allopathic medication. Patanjali ... See full document

9

Volume :11 Issue : 12 (December-2018) | International Research Journal of Business and Management

Volume :11 Issue : 12 (December-2018) | International Research Journal of Business and Management

... This research is exploratory research, which based on the secondary data from different research papers on tourism education and ...this research, we tried to incorporate the system approach ... See full document

11

Volume :11 Issue : 12 (December-2018) | International Research Journal of Business and Management

Volume :11 Issue : 12 (December-2018) | International Research Journal of Business and Management

... and management program in place must focus on overcoming their exclusive obstructions to a best practice ...and management system should perhaps consider it seriously; assessing the needs, requirements, and ... See full document

6

Lecture Timetable Scheduling Software

Lecture Timetable Scheduling Software

... International Journal of Scientific and Research Publications, Volume 8, Issue 9, September 2018 ISSN 2250-3153.. Figure 5: LTSS Interface.[r] ... See full document

10

Design of a Cell phone Based Solar Powered Electric Vehicle
K Sunil, G Priyanka &amp; V Nagamahesh

Design of a Cell phone Based Solar Powered Electric Vehicle K Sunil, G Priyanka & V Nagamahesh

... ISSN No 2348 4845 International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal Volume No 2 (2015), Issue No 9 (September) Sept[.] ... See full document

5

Parallel and Distributed Mechanisms for Data Access in Enciphered Clouds
T Supraja Pavithra &amp; Mrs J Manjula

Parallel and Distributed Mechanisms for Data Access in Enciphered Clouds T Supraja Pavithra & Mrs J Manjula

... ISSN No 2348 4845 International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal Volume No 2 (2015), Issue No 9 (September) Sept[.] ... See full document

7

MOTHERS’ SATISFACTION ON MATERNITY CARE SERVICES IN BHARATPUR HOSPITAL CHITWAN, NEPAL

MOTHERS’ SATISFACTION ON MATERNITY CARE SERVICES IN BHARATPUR HOSPITAL CHITWAN, NEPAL

... Satisfaction with healthcare services is defined as the extent to which the patients seeking treatment experience positive perception of the care provided by the nursing or medical staff. Ideally, patients who are ... See full document

12

A Unique Method for Empirical Evaluation of Classifier Security (Performance Degradation) At Design Phase
Narayan Sudheer &amp; Mr Abdul Rahaman Shaik

A Unique Method for Empirical Evaluation of Classifier Security (Performance Degradation) At Design Phase Narayan Sudheer & Mr Abdul Rahaman Shaik

... this issue is thus needed to allow the trusted adoption of pattern clas- sifiers in adversarial environments, starting from the theo- retical foundations up to novel design methods, extend- ing the classical ... See full document

6

A New Security Approach Based on CARP using Hard AI Problems
Y Manohar Reddy &amp; K Phalguna Rao

A New Security Approach Based on CARP using Hard AI Problems Y Manohar Reddy & K Phalguna Rao

... For many security reasons there is a stage forward ques- tion is there? using AI there may be a different way of generating the captcha’s and applying them for user friendliness logging. for some different reasons we may ... See full document

6

Public Auditing for Shared Data with Efficient User Revocation in the Cloud
Kangala Narasimha Rao, N S Vidya Sahithi &amp; S S Madhavi

Public Auditing for Shared Data with Efficient User Revocation in the Cloud Kangala Narasimha Rao, N S Vidya Sahithi & S S Madhavi

... the management of the data and servic- es may not be fully trustworthy on cloud, as users no lon- ger have physical possession of the outsourced personal data so data integrity protection becomes a difficult ... See full document

5

Consistency as a Service Auditing Cloud Consistency
Shaik Reshma, Y Laxmi &amp; S S Madhavi

Consistency as a Service Auditing Cloud Consistency Shaik Reshma, Y Laxmi & S S Madhavi

... Consider the scenario shown in Fig. 1. In this case as- sume that Alice and Bob are working on a project using cloud storage services, the data related to the project is copied to five cloud storage servers CS1,…..,CS5. ... See full document

7

Privacy Preserving Multi Keyword Ranked Search over Encrypted Cloud Data
Bagam Sabitha, N Rajesh &amp; S S Madhavi

Privacy Preserving Multi Keyword Ranked Search over Encrypted Cloud Data Bagam Sabitha, N Rajesh & S S Madhavi

... The advancement in cloud computing has motivated the data owners to outsource their data management sys- tems from local sites to commercial public cloud for great flexibility and economic savings. But people can ... See full document

6

Hardware Software Co Design of Image Edge Detection Using Canny Algorithm
K Padma &amp; V V Ujwala

Hardware Software Co Design of Image Edge Detection Using Canny Algorithm K Padma & V V Ujwala

... [4 ]Du-Ming Tsai and Shia-Chih Lai, “Independent Com- ponent AnalysisBased Background Subtraction for In- door Surveillance,” hnage Processing,IEEE Transactions on Volume 18, Issue 1, Jan. 2009 Page(s):158 ... See full document

5

A Broad Behavioral Characterization of Proximity Malware Detection Approach Which Based on Bayesian Model in DTNS
Yadlapalli Suharika &amp; Vedururu Sireesha

A Broad Behavioral Characterization of Proximity Malware Detection Approach Which Based on Bayesian Model in DTNS Yadlapalli Suharika & Vedururu Sireesha

... security research, such as the use of distributed certificate authorities and PKI ...delay-tolerant research community include: 1) the use of identity-based encryption, which allows nodes to receive ... See full document

5

Versatile Distributed Service Integrity Check for Software as a Service in Clouds
Sankranthi Mohan &amp; E Ramesh Reddy

Versatile Distributed Service Integrity Check for Software as a Service in Clouds Sankranthi Mohan & E Ramesh Reddy

... turned business-to-consumer (B2C) on its ...primarily business-to-business- (B2B-) ...database management systems in the ...data management for in- tegrating on-premise applications ... See full document

5

Regulate Capacity Sharing in a Federation of Hybrid Cloud Providers
Binay Kumar &amp; H Saidulu

Regulate Capacity Sharing in a Federation of Hybrid Cloud Providers Binay Kumar & H Saidulu

... Tian Wenhong et al [24] start off by listing out the various advantages of cloud computing in our fast paced world, such as reduced costs, sharing, hiding complexity etc. But most cloud computing platforms’ ... See full document

6

An Effective Management of PHR in Cloud Environment using Attribute Based Encryption
K Pallavi &amp; Dr Ashok Kumar Nanda

An Effective Management of PHR in Cloud Environment using Attribute Based Encryption K Pallavi & Dr Ashok Kumar Nanda

... key management scalability, dynamic policy updates, and efficient on-demand revocation are non-trivial to solve, and remain largely open ...key management challenges, we conceptually divide the users in the ... See full document

8

Show all 10000 documents...